Malware
Adversaries may develop malware and malware components that can be used during targeting. Building malicious software can include the development of payloads, droppers, post-compromise tools, backdoors (including backdoored images), packers, C2 protocols, and the creation of infected removable media. Adversaries may develop malware to support their operations, creating a means for maintaining control of remote machines, evading defenses, and executing post-compromise behaviors.(Citation: Mandian...
BY SOURCE
PROCEDURES (5)
Auto-extracted: 4 detections for process creation monitoring
Auto-extracted: 2 detections for remote
Auto-extracted: 1 detections for general monitoring
Auto-extracted: 1 detections for script execution monitoring
Auto-extracted: 1 detections for file monitoring